Survey of the High Volume Network Traffic Data Monitoring

Size: px
Start display at page:

Download "Survey of the High Volume Network Traffic Data Monitoring"

Transcription

1 Available Online at International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 12, December 2013, pg SURVEY ARTICLE ISSN X Survey of the High Volume Network Traffic Data Monitoring Birunda Devi.M 1, Vairachilai.S 2 PG Student¹, Assistant Professor² Department of Computer Science and Engineering, NPR College of Engineering and Technology, TamilNadu, India. birunda.devi@gmail.com Abstract- Network Traffic monitoring describes the use of a system that constantly monitors a computer network for slow or failing components and that notifies the network administrator in case of outages. Network traffic measurement is the process of measuring the amount and type of traffic on a particular network. This is especially important with regard to effective bandwidth management. Network traffic is monitoring and analysis in order to maintain the network system stability and availability such as to fix network problems on time or to avoid network failure, to ensure the network security strength, and to make good decisions for network planning. The monitoring, detecting and analysis of this traffic may be against the goal of maintaining privacy of individuals whose network communications are being monitored. The network traffic monitoring can identify performance of the static and dynamic IP address. Index terms: Traffic data; Netflow; tcpdump; Monitoring I. INTRODUCTION Network monitoring for a corporate network is a critical IT function that can save money in network performance, employee productivity and infrastructure cost overruns. A network monitoring system monitors an internal network for problems. It can find and help resolve snail-paced webpage downloads, lost-in-space e- mail, questionable user activity and file delivery caused by overloaded, crashed servers, dicey network connections or other devices. Network monitoring can be done by on a high level into maintaining the network's current status, ensuring availability and improving performance. An NMS also can help you build a database of critical information that can use to plan for future growth. Network monitoring systems come with automatic discovery, which is the ability to continuously record devices as they're added, removed or undergo configuration changes. The network monitoring can be based different types of networks like wired, wireless, LAN, VPN, WAN. Network monitoring can be achieved using various or a combination of plug-and-play hardware and 2013, IJCSMC All Rights Reserved 298

2 software appliance solutions. Virtually any kind of network can be monitored. It doesn't matter whether it's wireless or wired, a corporate LAN, VPN or service provider WAN. Monitor devices on different operating systems with a multitude of functions, ranging from Blackberry and cell phones, to servers, routers and switches. These systems can help you identify specific activities and performance metrics, producing results that enable a business to address various and sundry needs, including meeting compliance requirements, stomping out internal security threats and providing more operational visibility. Performance-sensitive functions include voice over IP (VoIP), Internet Protocol TV (IPTV) and video on demand (VOD). Monitoring enables managers to allocate resources to maintain system integrity. Network monitoring can provide the Measure latency, or the delayed transfer of data. The monitoring, detecting and analysis of this traffic may be against the goal of maintaining privacy of individuals whose network communications are being monitored. II. LITERATURE REVIEW 2.1 Monitoring Infrastructure for Converged Networks and Services Network convergence is enabling service providers to deploy a wide range of services based IP networks. Traditional network management systems are not suitable to managing converged networks. This enables service providers to monitor and manage their networks to provide the necessary quality, availability, and security. In this monitoring infrastructure supports three primary functions: service assurance, traffic profiling, and fault detection and diagnosis. Traditionally, IP networks have been managed by measuring aggregate parameters that are link utilization and packet losses, over interfaces of routers or other network elements. This proposed monitoring infrastructure supports three primary functions: service assurance, traffic pro-filing, and fault detection and diagnosis. These requirements drive the need for a robust, scalable, and easy-to-use network management platform that enables service providers to monitor and manage their networks to provide the necessary quality, availability, and security. This paper describes the Monitoring mechanisms that give service providers critical information on the performance of their networks at a per-user, per-service granularity in real time. This allows the service providers to ensure that their networks adequately satisfy the requirements of the various services. The proposed monitoring infrastructure has the following components: Measurement source: This provides the element for the monitoring applications from the necessary measurements. The monitoring applications use this information to deduce the performance of the network and to identify faults. Topology inventory: The data collected using the measurement sources can be used to identify problems in the network. Measurement layer: This layer provides an inter-face that can be used by monitoring applications to gain access to the data collected by the various measurement sources. Monitoring applications: Finally, the various monitoring applications use the data from the measurement layer to offer service providers insight into the performance of their networks for each service. The proposed monitoring infrastructure consisting of various measurement methods and this provides a powerful platform to develop and deploy a wide variety of monitoring applications. Measurements through monitoring mechanisms are mapped by voice quality metrics to the actual quality of the end-user experience, referred to as mean opinion score (MOS). 2.2 An Information-Theoretic Approach to Network Monitoring and Measurement In this paper include the information of packet measurement traces, monitoring collection ranges of packets and trace the join information. The information of packet measurements traces are made at either the flow level trace (NetFlow traces) or the packet/byte count level trace (SNMP traces). It propose and validate a flow-level model and it use to determine the information content of a packet trace collected at a single or multiple points in a network, and of sets of packet traces collected at separate points. This is used for to identify and quantify the potential benefit of network trace compression based on the network flow model. Regarding traces collected at a single monitoring point and derive an information theoretic bound for the information content in those traces, or equivalently for the potential benefit of lossless compression on those traces. NetFlow or packet header capture and reporting can require a significant amount of bandwidth and storage. The techniques have the potential to significantly reduce those bandwidth and storage requirements. 2013, IJCSMC All Rights Reserved 299

3 The benefit gained from compressing a packet header trace gathered from one network monitor or traces collected at a set of network monitors. Customer traffic largely goes to one of the two back-bone links. It is an ideal first step to analyse information redundancy without being overwhelmed by complicated routing. The full packet traces to deduce an SNMP-like utilization trace (referred to as utilization trace) and an unsampled raw Net-flow trace. NetFlow processes all the packets in all the flows. In a real network environment, both the number of flows and the number of packets generated by those flow are large. NetFlow can employ flow sampling, where only a fraction of flows are monitored, and packet sampling, where only a fraction of packets are counted, to reduce its cost in computation and memory, etc. 2.3 Data Pre-Processing Evaluation for Web Log Mining: Reconstruction of Activities of a Web Visitor Presumptions of each data analysis are data themselves focus of selected analysis highly depend on the quality of analysed data. The analysis data are creating data matrices and web map based on these data will serve for searching for behaviour patterns of users. The data are tried to assess the impact based on the quantity and quality of the users behaviour patterns. The observed variables into the log file are the necessary data like IP address, URL address, data and the time access etc. Good quality data are a prerequisite for a well-realized data analysis. The purpose of using this as for the following Survey sampling to find out particular items in the questionnaire and a visitor of the knows objects of site, Web log mining to analyse the log file of the web server, this contains information on accesses to the pages of the visitor. The aim of the is to find out using an experiment to what measure it is necessary to execute data preparation for web log mining and determine inevitable steps for gaining valid data from the log file. More accurately, the aim is to assess the impact of reconstruction of the activities of a web visitor on the quantity and quality of the extracted rules which represent the web users behaviour patterns. Log file of the web server is a source of anonymous data about the user. These anonymous data represent also the problem of unique identification of the web visitor. There exist several accesses from a single IP address with various versions of the browser or operating system, there is not only one user also assume that if such an access can be accessed as the one by other user. Session can be defined as a series of steps, which lead to the fulfilment of a certain task or as a series of steps, which lead to the reaching of a certain goal. The simplest method is to consider a session to be a series of clicks for a certain period of time. A real value for session can be derived based on empirical data. The experiments for data preparation can be consisted of the following steps: data cleaning, identification of sessions and reconstruction of activities of a web visitor. The data cleaning is filtration of whole data preparation process. Identification of sessions of the user allows us to eliminate NAT and proxy devices, as well as identify various users alternating behind one computer. The analyses of the log file of the web server are performed efficiently. This provides the quantity and quality of the data matrix representation format for the users web log files. 2.4 A Packet-Level Characterization of Network Traffic A packet-level traffic characterization aiming at finding spatial and temporal invariance of TCP based applications, such as HTTP and SMTP. In traditional SMTP traffic characterization method is simply generalize and packet level are distinct behaviours of different traffic can be captured. A methodology and software architecture to build packet level statistical characterization of network traffic based on large trace. There is a deeply investigated on HTTP traffic modelling and characterization at packet level. Maximum Transmission Unit (MTU) of the network interfaces on the hosts, which limits the size of packets that can be sent and received.network traffic can be viewed at different abstraction levels are session, conversation, connection/flow, packet, and byte. In this paper we focus our attention on the packet level a packet-level approach is not taken into consideration because of its dependency from network conditions and end-to-end flow control and originally expressed in about applications characterized by bulk transfers. Characterizing traffic generated by sources and related to specific application-level protocols, also with the purpose to conduct realistic network traffic simulations. The decomposition of aggregate traffic into conversations and on packet-level traffic characterization of traffic inside conversations, that is, models based mainly on two variables: packet size (PS) and inter-packet 2013, IJCSMC All Rights Reserved 300

4 time (IPT). There are important advantages in this approach are do not need to make any assumptions regarding the kind of applications generating traffic, the same methodology is easily extensible to study other applicationlevel protocols and mixes, packet-level models are simple and easily applicable to traffic simulations that can be used to study network-related issues (measuring delay, jitter, packet loss etc.)or to test network equipment. 2.5 Traffic Data Repository at the WIDE Project Traffic traces are collected by tcpdump and, after removing privacy information; the traces are made open to the public. WIDE project to collect a set of free tools build a traffic data repository containing detailed information of our backbone traffic. It not only on freely-redistributable software but also on freelyredistributable traffic data sets. The goals of the traffic repository are to promote traffic analysis research as well as to promote development of tools. The monitoring tools in the UNIX based have the advantage of that users can use other software tools available on UNIX for manipulating and analysing packet traces. tcpdump is probably the most popular packet capturing tool in the UNIX community. tcpdump is based on a powerful filtering mechanism, the BSD packet filter (BPF).The packet capturing and filtering facilities of tcpdump are implemented in a separate library, pcap. The motivation of the traffic information tends to be confined to a small set of members, and it is difficult to share detailed information without a framework to support sharing. In achieve a good use of this type of traffic trace repository have to solve two problems. One is to create a safety measure for handling traces that include privacy information. The other is automation of the trace acquisition process. This paper has used the several tools to automatically maintain the traffic repository there are tcpdump, tcpdpriv, tcpdstat. tcpdump, puts the network interface into promiscuous mode to capture every packet going across the wire. tcpdump in the user space can read multiple frames in a single read from the store buffer in the kernel in an efficient manner. tcpdpriv to remove user data and scramble addresses. Tcpdpriv removes the payload of TCP and UDP, and the entire IP payload for other protocols. tcpdpriv implements several address scrambling methods; the sequential numbering method and its variants, and a hash method with preserving address prefix. tcpdstat reads a tcpdump file using the pcap library and prints the statistics of a trace. tcpdstat is intended to provide a rough idea of the trace content. The output can be easily converted to a HTTP format. III. CONCLUSION In this paper describe the literature survey for expressing the different methods have used for the monitoring the network traffic data. And this monitoring can be performed for the improvement of the network usage performance and different techniques used in the network based on their situations. This Literature survey express the techniques have been used for monitoring the high volume data and there is some monitoring tools can also be used for the monitoring of the data. In the existing system can be expressed the different techniques for monitoring traffic data. Due to the proposed system can be the development of the efficient monitoring techniques for the improvement of the sensitivity and scalability for the traffic data. REFERENCES [1]. S. Agrawal, C. N. Kanthi, K. V. M. Naidu, J. Ramamirtham, R. Rastogi, S. Satkin, and A. Srinivasan, Monitoring infrastructure for converged networks and services, Bell Labs Technical J., vol. 12, no. 2, pp , [2]. Y. Liu, D. Towsley, T. Ye, and J. Bolot, An information-theoretic approach to network monitoring and measurement, in 2005 IMC. [3]. Dainotti, A. Pescap`e, and G. Ventre, A packet-level characterization of network traffic, in Proc CAMAD, pp [4]. M. Munk, J. Kapusta, and P. Svec, Data preprocessing evaluation for web log mining: reconstruction of activities of a web visitor, Procedia Computer Science, vol. 1, no. 1, pp , , IJCSMC All Rights Reserved 301

5 [5]. K. Cho, K. Mitsuya, and A. Kato, Traffic data repository at the WIDE project, in Proc USENIX Annual. [6]. M. Peuhkuri, A method to compress and anonymize packet traces, in Proc ACM Internet Measurement Workshop, pp [7]. B. Claise, G. Sadasivan, V. Valluri, and M. Djernaes, Cisco systems netflow services export version 9, RFC 3954, Oct. 2004, Tech. Rep. [8]. Pescap e, Entropy-based reduction of traffic data, IEEE Commun. Lett., vol. 11, no. 2, pp , Feb [9]. B. Pfaff, Performance analysis of BSTs in system software, in ACM SIGMETRICS Performance Evaluation Review, vol. 32, no. 1, pp , [10]. M. AdelsonVelskii and E. Landis, An Algorithm for the Organization of Information. Defense Technical Information Center, [11]. G. Aceto, A. Botta, A. Pescap e, and C. Westphal, An efficient storage technique for network monitoring data, in 2011 IEEE International Workshop on Measurements & Networking. 2013, IJCSMC All Rights Reserved 302

Network Management Deployment Guide

Network Management Deployment Guide Smart Business Architecture Borderless Networks for Midsized organizations Network Management Deployment Guide Revision: H1CY10 Cisco Smart Business Architecture Borderless Networks for Midsized organizations

More information

Simulation and Monitoring of a University Network for Bandwidth Efficiency Utilization

Simulation and Monitoring of a University Network for Bandwidth Efficiency Utilization Simulation and Monitoring of a University Network for Bandwidth Efficiency Utilization Samuel N. John 1, Charles Ndujuiba 2, Robert Okonigene 3, Ndeche Kenechukwu 4 1,2,4 Department of Electrical and Information

More information

Gaining Operational Efficiencies with the Enterasys S-Series

Gaining Operational Efficiencies with the Enterasys S-Series Gaining Operational Efficiencies with the Enterasys S-Series Hi-Fidelity NetFlow There is nothing more important than our customers. Gaining Operational Efficiencies with the Enterasys S-Series Introduction

More information

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,

More information

CloudLink - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds

CloudLink - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds February 2011 1 Introduction Today's business environment requires organizations

More information

Scalable Extraction, Aggregation, and Response to Network Intelligence

Scalable Extraction, Aggregation, and Response to Network Intelligence Scalable Extraction, Aggregation, and Response to Network Intelligence Agenda Explain the two major limitations of using Netflow for Network Monitoring Scalability and Visibility How to resolve these issues

More information

How To Monitor And Test An Ethernet Network On A Computer Or Network Card

How To Monitor And Test An Ethernet Network On A Computer Or Network Card 3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel

More information

Cisco Integrated Services Routers Performance Overview

Cisco Integrated Services Routers Performance Overview Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,

More information

Choosing Application Performance Management (APM) Tools

Choosing Application Performance Management (APM) Tools 1990-2010 Peter Sevcik and NetForecast, Inc., All rights reserved. Choosing Application Performance Management (APM) Tools Peter Sevcik NetForecast, Inc. Charlottesville, Virginia peter@netforecast.com

More information

Quality of Service (QoS) and Quality of Experience (QoE) VoiceCon Fall 2008

Quality of Service (QoS) and Quality of Experience (QoE) VoiceCon Fall 2008 Quality of Service (QoS) and Quality of Experience (QoE) VoiceCon Fall 2008 John Bartlett NetForecast, Inc. john@netforecast.com www.netforecast.com VoIP Deployment Realities VoIP is not just another application

More information

The Analysis and Simulation of VoIP

The Analysis and Simulation of VoIP ENSC 427 Communication Networks Spring 2013 Final Project The Analysis and Simulation of VoIP http://www.sfu.ca/~cjw11/427project.html Group #3 Demet Dilekci ddilekci@sfu.ca Conrad Wang cw11@sfu.ca Jiang

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

"Charting the Course... ... to Your Success!" QOS - Implementing Cisco Quality of Service 2.5 Course Summary

Charting the Course... ... to Your Success! QOS - Implementing Cisco Quality of Service 2.5 Course Summary Course Summary Description Implementing Cisco Quality of Service (QOS) v2.5 provides learners with in-depth knowledge of QoS requirements, conceptual models such as best effort, IntServ, and DiffServ,

More information

Cisco Network Analysis Module Software 4.0

Cisco Network Analysis Module Software 4.0 Cisco Network Analysis Module Software 4.0 Overview Presentation Improve Operational Efficiency with Increased Network and Application Visibility 1 Enhancing Operational Manageability Optimize Application

More information

Cisco IOS Flexible NetFlow Technology

Cisco IOS Flexible NetFlow Technology Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application

More information

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to

More information

Application Latency Monitoring using nprobe

Application Latency Monitoring using nprobe Application Latency Monitoring using nprobe Luca Deri Problem Statement Users demand services measurements. Network boxes provide simple, aggregated network measurements. You cannot always

More information

Cisco Change Management: Best Practices White Paper

Cisco Change Management: Best Practices White Paper Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process

More information

Cisco Application Networking for IBM WebSphere

Cisco Application Networking for IBM WebSphere Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

Cover. White Paper. (nchronos 4.1)

Cover. White Paper. (nchronos 4.1) Cover White Paper (nchronos 4.1) Copyright Copyright 2013 Colasoft LLC. All rights reserved. Information in this document is subject to change without notice. No part of this document may be reproduced

More information

Encapsulating Voice in IP Packets

Encapsulating Voice in IP Packets Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols

More information

FIRE-ROUTER: A NEW SECURE INTER-NETWORKING DEVICE

FIRE-ROUTER: A NEW SECURE INTER-NETWORKING DEVICE Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.279

More information

vsphere Networking vsphere 6.0 ESXi 6.0 vcenter Server 6.0 EN-001391-01

vsphere Networking vsphere 6.0 ESXi 6.0 vcenter Server 6.0 EN-001391-01 vsphere 6.0 ESXi 6.0 vcenter Server 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more

More information

Introduction Chapter 1. Uses of Computer Networks

Introduction Chapter 1. Uses of Computer Networks Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information

ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy

ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to

More information

IMPLEMENTING CISCO QUALITY OF SERVICE V2.5 (QOS)

IMPLEMENTING CISCO QUALITY OF SERVICE V2.5 (QOS) IMPLEMENTING CISCO QUALITY OF SERVICE V2.5 (QOS) COURSE OVERVIEW: Implementing Cisco Quality of Service (QOS) v2.5 provides learners with in-depth knowledge of QoS requirements, conceptual models such

More information

Packet Flow Analysis and Congestion Control of Big Data by Hadoop

Packet Flow Analysis and Congestion Control of Big Data by Hadoop Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.456

More information

PANDORA FMS NETWORK DEVICES MONITORING

PANDORA FMS NETWORK DEVICES MONITORING NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,

More information

Network Simulation Traffic, Paths and Impairment

Network Simulation Traffic, Paths and Impairment Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating

More information

Implementing Cisco Quality of Service QOS v2.5; 5 days, Instructor-led

Implementing Cisco Quality of Service QOS v2.5; 5 days, Instructor-led Implementing Cisco Quality of Service QOS v2.5; 5 days, Instructor-led Course Description Implementing Cisco Quality of Service (QOS) v2.5 provides learners with in-depth knowledge of QoS requirements,

More information

Cisco Application Networking for BEA WebLogic

Cisco Application Networking for BEA WebLogic Cisco Application Networking for BEA WebLogic Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

Designing for Cisco Internetwork Solutions

Designing for Cisco Internetwork Solutions Designing for Cisco Internetwork Solutions Course DESGN v2.1; 5 Days, Instructor-led Course Description: Designing for Cisco Internetwork Solutions (DESGN) v2.1 is an instructor-led course presented by

More information

Identifying functional and Performance related issues in a network based on Auto Test Packet generation

Identifying functional and Performance related issues in a network based on Auto Test Packet generation Identifying functional and Performance related issues in a network based on Auto Test Packet generation Kanakati Sravan Kumar M.Tech Student Department of CSE Sri Venkateswara Engineering College-Suryapet

More information

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Essential Curriculum Computer Networking II Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Chapter 1 Networking in the Enterprise-------------------------------------------------

More information

SUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN

SUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN SUNYIT Reaction Paper 2 Measuring the performance of VoIP over Wireless LAN SUBMITTED BY : SANJEEVAKUMAR 10/3/2013 Summary of the Paper The paper s main goal is to compare performance of VoIP in both LAN

More information

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected

More information

Research on Errors of Utilized Bandwidth Measured by NetFlow

Research on Errors of Utilized Bandwidth Measured by NetFlow Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Lab VI Capturing and monitoring the network traffic

Lab VI Capturing and monitoring the network traffic Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)

More information

PANDORA FMS NETWORK DEVICE MONITORING

PANDORA FMS NETWORK DEVICE MONITORING NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,

More information

IP Telephony Management

IP Telephony Management IP Telephony Management How Cisco IT Manages Global IP Telephony A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Design, implement, and maintain a highly available, reliable, and resilient

More information

SiteCelerate white paper

SiteCelerate white paper SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance

More information

Business case for VoIP Readiness Network Assessment

Business case for VoIP Readiness Network Assessment Business case for VoIP Readiness Network Assessment Table of contents Overview... 2 Different approaches to pre-deployment assessment:.......... 2 Other considerations for VoIP pre-deployment... 3 The

More information

Observer Probe Family

Observer Probe Family Observer Probe Family Distributed analysis for local and remote networks Monitor and troubleshoot vital network links in real time from any location Network Instruments offers a complete line of software

More information

NetFlow/IPFIX Various Thoughts

NetFlow/IPFIX Various Thoughts NetFlow/IPFIX Various Thoughts Paul Aitken & Benoit Claise 3 rd NMRG Workshop on NetFlow/IPFIX Usage in Network Management, July 2010 1 B #1 Application Visibility Business Case NetFlow (L3/L4) DPI Application

More information

Question: 3 When using Application Intelligence, Server Time may be defined as.

Question: 3 When using Application Intelligence, Server Time may be defined as. 1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT)

Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT) Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT) Course Number: 642 845 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: Cisco CCNP Exam 642 845:

More information

WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO

WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO The number of branch-office work sites is increasing, so network administrators need tools to

More information

Hadoop Technology for Flow Analysis of the Internet Traffic

Hadoop Technology for Flow Analysis of the Internet Traffic Hadoop Technology for Flow Analysis of the Internet Traffic Rakshitha Kiran P PG Scholar, Dept. of C.S, Shree Devi Institute of Technology, Mangalore, Karnataka, India ABSTRACT: Flow analysis of the internet

More information

Your new VoIP Network is working great Right? How to Know. April 2012 WHITE PAPER

Your new VoIP Network is working great Right? How to Know. April 2012 WHITE PAPER Your new VoIP Network is working great Right? How to Know April 2012 Executive Summary This paper discusses the importance of measuring and monitoring the voice quality of VoIP calls traversing the data

More information

Networked AV Systems Pretest

Networked AV Systems Pretest Networked AV Systems Pretest Instructions Choose the best answer for each question. Score your pretest using the key on the last page. If you miss three or more out of questions 1 11, consider taking Essentials

More information

The need for bandwidth management and QoS control when using public or shared networks for disaster relief work

The need for bandwidth management and QoS control when using public or shared networks for disaster relief work International Telecommunication Union The need for bandwidth management and QoS control when using public or shared networks for disaster relief work Stephen Fazio Chief, Global Telecommunications Officer

More information

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps

More information

Open Source in Network Administration: the ntop Project

Open Source in Network Administration: the ntop Project Open Source in Network Administration: the ntop Project Luca Deri 1 Project History Started in 1997 as monitoring application for the Univ. of Pisa 1998: First public release v 0.4 (GPL2) 1999-2002:

More information

Preparing Your IP Network for High Definition Video Conferencing

Preparing Your IP Network for High Definition Video Conferencing WHITE PAPER Preparing Your IP Network for High Definition Video Conferencing Contents Overview...3 Video Conferencing Bandwidth Demand...3 Bandwidth and QoS...3 Bridge (MCU) Bandwidth Demand...4 Available

More information

SLA para aplicaciones en redes WAN. Alvaro Cayo Urrutia

SLA para aplicaciones en redes WAN. Alvaro Cayo Urrutia SLA para aplicaciones en redes WAN Alvaro Cayo Urrutia Quién es FLUKE NETWORKS? Enterprise SuperVision (ESV) Soluciones portátiles de prueba y análisis LAN y WAN distribuidas Infrastructure SuperVision

More information

Network Application Performance Alignment to IT Best Practices

Network Application Performance Alignment to IT Best Practices Network Application Performance Alignment to IT Best Practices This white paper briefly describes best practices, highlights IT best practices and discusses in detail; IT business service management, the

More information

The new services in nagios: network bandwidth utility, email notification and sms alert in improving the network performance

The new services in nagios: network bandwidth utility, email notification and sms alert in improving the network performance The new services in nagios: network bandwidth utility, email notification and sms alert in improving the network performance Mohammad Ali Arsyad bin Mohd Shuhaimi Hang Tuah Jaya, 76100 Durian Tunggal,

More information

Experimentation driven traffic monitoring and engineering research

Experimentation driven traffic monitoring and engineering research Experimentation driven traffic monitoring and engineering research Amir KRIFA (Amir.Krifa@sophia.inria.fr) 11/20/09 ECODE FP7 Project 1 Outline i. Future directions of Internet traffic monitoring and engineering

More information

Huawei esight Brief Product Brochure

Huawei esight Brief Product Brochure Huawei esight Brief Product Brochure esight Integrated Enterprise NMS As the network scales and the number of enterprise network applications continue to grow, so does the number of devices, such as multi-service

More information

Virtual Private Networks

Virtual Private Networks Virtual Private Networks The Ohio State University Columbus, OH 43210 Jain@cse.ohio-State.Edu http://www.cse.ohio-state.edu/~jain/ 1 Overview Types of VPNs When and why VPN? VPN Design Issues Security

More information

Whitepaper. A Guide to Ensuring Perfect VoIP Calls. www.sevone.com blog.sevone.com info@sevone.com

Whitepaper. A Guide to Ensuring Perfect VoIP Calls. www.sevone.com blog.sevone.com info@sevone.com A Guide to Ensuring Perfect VoIP Calls VoIP service must equal that of landlines in order to be acceptable to both hosts and consumers. The variables that affect VoIP service are numerous and include:

More information

Voice Over IP Performance Assurance

Voice Over IP Performance Assurance Voice Over IP Performance Assurance Transforming the WAN into a voice-friendly using Exinda WAN OP 2.0 Integrated Performance Assurance Platform Document version 2.0 Voice over IP Performance Assurance

More information

Flow Analysis Versus Packet Analysis. What Should You Choose?

Flow Analysis Versus Packet Analysis. What Should You Choose? Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation

More information

Interconnecting Cisco Networking Devices: Accelerated (CCNAX) 2.0(80 Hs) 1-Interconnecting Cisco Networking Devices Part 1 (40 Hs)

Interconnecting Cisco Networking Devices: Accelerated (CCNAX) 2.0(80 Hs) 1-Interconnecting Cisco Networking Devices Part 1 (40 Hs) Interconnecting Cisco Networking Devices: Accelerated (CCNAX) 2.0(80 Hs) 1-Interconnecting Cisco Networking Devices Part 1 (40 Hs) 2-Interconnecting Cisco Networking Devices Part 2 (40 Hs) 1-Interconnecting

More information

Jive Core: Platform, Infrastructure, and Installation

Jive Core: Platform, Infrastructure, and Installation Jive Core: Platform, Infrastructure, and Installation Jive Communications, Inc. 888-850-3009 www.getjive.com 1 Overview Jive hosted services are run on Jive Core, a proprietary, cloud-based platform. Jive

More information

Proxy Server, Network Address Translator, Firewall. Proxy Server

Proxy Server, Network Address Translator, Firewall. Proxy Server Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as

More information

Preparing Your IP network for High Definition Video Conferencing

Preparing Your IP network for High Definition Video Conferencing White Paper Global Services April 2007 Table of Contents 1.0 OVERVIEW...3 2.0 VIDEO CONFERENCING BANDWIDTH DEMAND...3 3.0 AVAILABLE BANDWIDTH...5 3.1 Converged Network Links... 6 3.2 Dedicated Network

More information

Internet Management and Measurements Measurements

Internet Management and Measurements Measurements Internet Management and Measurements Measurements Ramin Sadre, Aiko Pras Design and Analysis of Communication Systems Group University of Twente, 2010 Measurements What is being measured? Why do you measure?

More information

This topic lists the key mechanisms use to implement QoS in an IP network.

This topic lists the key mechanisms use to implement QoS in an IP network. IP QoS Mechanisms QoS Mechanisms This topic lists the key mechanisms use to implement QoS in an IP network. QoS Mechanisms Classification: Each class-oriented QoS mechanism has to support some type of

More information

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand

More information

Application of Netflow logs in Analysis and Detection of DDoS Attacks

Application of Netflow logs in Analysis and Detection of DDoS Attacks International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 1-8 International Research Publication House http://www.irphouse.com Application of Netflow logs in

More information

Performance Evaluation of Linux Bridge

Performance Evaluation of Linux Bridge Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet

More information

Hosted Voice. Best Practice Recommendations for VoIP Deployments

Hosted Voice. Best Practice Recommendations for VoIP Deployments Hosted Voice Best Practice Recommendations for VoIP Deployments Thank you for choosing EarthLink! EarthLinks best in class Hosted Voice phone service allows you to deploy phones anywhere with a Broadband

More information

VegaStream Information Note Considerations for a VoIP installation

VegaStream Information Note Considerations for a VoIP installation VegaStream Information Note Considerations for a VoIP installation To get the best out of a VoIP system, there are a number of items that need to be considered before and during installation. This document

More information

Internet Traffic Measurement

Internet Traffic Measurement Internet Traffic Measurement Internet Traffic Measurement Network Monitor Placement Measurement Analysis Tools Measurement Result Reporting Probing Mechanism Vantage Points Edge vs Core Hardware vs Software

More information

Convergence Technologies Professional (CTP) Course 1: Data Networking

Convergence Technologies Professional (CTP) Course 1: Data Networking Convergence Technologies Professional (CTP) Course 1: Data Networking The Data Networking course teaches you the fundamentals of networking. Through hands-on training, you will learn the vendor-independent

More information

Performance of Cisco IPS 4500 and 4300 Series Sensors

Performance of Cisco IPS 4500 and 4300 Series Sensors White Paper Performance of Cisco IPS 4500 and 4300 Series Sensors White Paper September 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of

More information

Monitoring Large Flows in Network

Monitoring Large Flows in Network Monitoring Large Flows in Network Jing Li, Chengchen Hu, Bin Liu Department of Computer Science and Technology, Tsinghua University Beijing, P. R. China, 100084 { l-j02, hucc03 }@mails.tsinghua.edu.cn,

More information

Optimizing Converged Cisco Networks (ONT)

Optimizing Converged Cisco Networks (ONT) Optimizing Converged Cisco Networks (ONT) Module 3: Introduction to IP QoS Introducing QoS Objectives Explain why converged networks require QoS. Identify the major quality issues with converged networks.

More information

Global Server Load Balancing

Global Server Load Balancing White Paper Overview Many enterprises attempt to scale Web and network capacity by deploying additional servers and increased infrastructure at a single location, but centralized architectures are subject

More information

Network Management and Monitoring Software

Network Management and Monitoring Software Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the

More information

LARGE-SCALE INTERNET MEASUREMENTS FOR DIAGNOSTICS AND PUBLIC POLICY. Henning Schulzrinne (+ Walter Johnston & James Miller) FCC & Columbia University

LARGE-SCALE INTERNET MEASUREMENTS FOR DIAGNOSTICS AND PUBLIC POLICY. Henning Schulzrinne (+ Walter Johnston & James Miller) FCC & Columbia University 1 LARGE-SCALE INTERNET MEASUREMENTS FOR DIAGNOSTICS AND PUBLIC POLICY Henning Schulzrinne (+ Walter Johnston & James Miller) FCC & Columbia University 2 Overview Quick overview What does MBA measure? Can

More information

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1 Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the

More information

Riverbed SteelCentral. Product Family Brochure

Riverbed SteelCentral. Product Family Brochure Riverbed SteelCentral Product Family Brochure Application performance from the perspective that matters most: Yours Applications are now the center of the business world. We rely on them to reach customers,

More information

Cisco Network Optimization Service

Cisco Network Optimization Service Service Data Sheet Cisco Network Optimization Service Optimize your network for borderless business evolution and innovation using Cisco expertise and leading practices. New Expanded Smart Analytics Offerings

More information

NOS for Network Support (903)

NOS for Network Support (903) NOS for Network Support (903) November 2014 V1.1 NOS Reference ESKITP903301 ESKITP903401 ESKITP903501 ESKITP903601 NOS Title Assist with Installation, Implementation and Handover of Network Infrastructure

More information

Introduction to Passive Network Traffic Monitoring

Introduction to Passive Network Traffic Monitoring Introduction to Passive Network Traffic Monitoring CS459 ~ Internet Measurements Spring 2015 Despoina Antonakaki antonakd@csd.uoc.gr Active Monitoring Inject test packets into the network or send packets

More information

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required Current Catalog Description: Computer network architectures and their application to industry needs.

More information

plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels

plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels Scrutinizer Competitor Worksheet Scrutinizer Malware Incident Response Scrutinizer is a massively scalable, distributed flow collection system that provides a single interface for all traffic related to

More information

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles. Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described

More information

CiscoWorks Internetwork Performance Monitor 4.0

CiscoWorks Internetwork Performance Monitor 4.0 CiscoWorks Internetwork Performance Monitor 4.0 Product Overview The CiscoWorks Internetwork Performance Monitor (IPM) is a network response-time and availability troubleshooting application. Included

More information

VoIP / SIP Planning and Disclosure

VoIP / SIP Planning and Disclosure VoIP / SIP Planning and Disclosure Voice over internet protocol (VoIP) and session initiation protocol (SIP) technologies are the telecommunication industry s leading commodity due to its cost savings

More information

Network Measurement. Why Measure the Network? Types of Measurement. Traffic Measurement. Packet Monitoring. Monitoring a LAN Link. ScienLfic discovery

Network Measurement. Why Measure the Network? Types of Measurement. Traffic Measurement. Packet Monitoring. Monitoring a LAN Link. ScienLfic discovery Why Measure the Network? Network Measurement Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101 ScienLfic discovery Characterizing traffic, topology, performance Understanding

More information

APPENDIX 8 TO SCHEDULE 3.3

APPENDIX 8 TO SCHEDULE 3.3 EHIBIT Q to Amendment No. 60 - APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT EHIBIT Q to Amendment No.

More information

Requirements of Voice in an IP Internetwork

Requirements of Voice in an IP Internetwork Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.

More information

Requirements for Simulation and Modeling Tools. Sally Floyd NSF Workshop August 2005

Requirements for Simulation and Modeling Tools. Sally Floyd NSF Workshop August 2005 Requirements for Simulation and Modeling Tools Sally Floyd NSF Workshop August 2005 Outline for talk: Requested topic: the requirements for simulation and modeling tools that allow one to study, design,

More information